General
-
Target
TS-240514-UF7.exe
-
Size
722KB
-
Sample
240514-b4nv7seg34
-
MD5
ff7a2cdf9e9ac0de23cb606f5e5313ee
-
SHA1
72f670d8976630c4f504a7b99d398090854ee87f
-
SHA256
4d0640898f24a62ed0f26a7f2653465b679da02c9716bf1eca47d7d83eb28094
-
SHA512
b37f58d8324fbcb6834b9e0a076d3b836a532325d7860b72f459a24b4b2b1b899ddfd2f363fdb09f4441a4939734a9adfaa2acba77bea178a1cfa32d2768f96e
-
SSDEEP
12288:kiJWNjpkskxRDqaCgqBR5F6HkkoFkqFDCH1XuMhVYYaATqiFzIDAHv7C7kSz93GM:kiJWNjpkskxRDqaCgqBR+ykVPdc0P7KQ
Static task
static1
Behavioral task
behavioral1
Sample
TS-240514-UF7.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
TS-240514-UF7.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.designworkbox.gr - Port:
587 - Username:
[email protected] - Password:
Palaimon_2023@ - Email To:
[email protected]
Targets
-
-
Target
TS-240514-UF7.exe
-
Size
722KB
-
MD5
ff7a2cdf9e9ac0de23cb606f5e5313ee
-
SHA1
72f670d8976630c4f504a7b99d398090854ee87f
-
SHA256
4d0640898f24a62ed0f26a7f2653465b679da02c9716bf1eca47d7d83eb28094
-
SHA512
b37f58d8324fbcb6834b9e0a076d3b836a532325d7860b72f459a24b4b2b1b899ddfd2f363fdb09f4441a4939734a9adfaa2acba77bea178a1cfa32d2768f96e
-
SSDEEP
12288:kiJWNjpkskxRDqaCgqBR5F6HkkoFkqFDCH1XuMhVYYaATqiFzIDAHv7C7kSz93GM:kiJWNjpkskxRDqaCgqBR+ykVPdc0P7KQ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Suspicious use of SetThreadContext
-